-
1
-
-
70349114349
-
-
projects/chimera
-
R. Alebouyeh, M.S. Allen, K.P.N. Puttaswamy, and B.Y. Zhao, Chimera Software Distribution, http://current.cs.ucsb.edu/projects/chimera, 2008.
-
(2008)
Chimera Software Distribution
-
-
Alebouyeh, R.1
Allen, M.S.2
Puttaswamy, K.P.N.3
Zhao, B.Y.4
-
2
-
-
36949014918
-
A Study of Prex Hijacking and Interception in the Internet
-
Sept
-
H. Ballani, P. Francis, and X. Zhang, "A Study of Prex Hijacking and Interception in the Internet," Proc. ACM SIGCOMM '07, Sept. 2007.
-
(2007)
Proc. ACM SIGCOMM '07
-
-
Ballani, H.1
Francis, P.2
Zhang, X.3
-
3
-
-
0037623983
-
Identity Based Encryption from the Weil Pairing
-
D. Boneh and M. Franklin, "Identity Based Encryption from the Weil Pairing," SIAM J. Computing, vol. 32, no. 3, pp. 586-615, 2003.
-
(2003)
SIAM J. Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
7
-
-
0036041927
-
Wide-Area Cooperative Storage with CFS
-
Oct
-
F. Dabek, M.F. Kaashoek, D. Karger, R. Morris, and I. Stoica, "Wide-Area Cooperative Storage with CFS," Proc. 18th ACM Symp. Operating Systems Principles (SOSP '01), Oct. 2001.
-
(2001)
Proc. 18th ACM Symp. Operating Systems Principles (SOSP '01)
-
-
Dabek, F.1
Kaashoek, M.F.2
Karger, D.3
Morris, R.4
Stoica, I.5
-
8
-
-
2642576704
-
Towards a Common API for Structured P2P Overlays
-
Feb
-
F. Dabek, B. Zhao, P. Druschel, J. Kubiatowicz, and I. Stoica, "Towards a Common API for Structured P2P Overlays," Proc. Second Int'l Workshop Peer-to-Peer Systems (IPTPS '03), Feb. 2003.
-
(2003)
Proc. Second Int'l Workshop Peer-to-Peer Systems (IPTPS '03)
-
-
Dabek, F.1
Zhao, B.2
Druschel, P.3
Kubiatowicz, J.4
Stoica, I.5
-
9
-
-
0038011186
-
A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks
-
Nov
-
E. Damiani et al., "A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks," Proc. Ninth ACM Conf. Computer and Comm. Security (CCS '02), Nov. 2002.
-
(2002)
Proc. Ninth ACM Conf. Computer and Comm. Security (CCS '02)
-
-
Damiani, E.1
-
11
-
-
30944440583
-
Using NTP to Control and Synchronize System Clocks,
-
Technical Report 816-1475-10, Sun Microsystems Inc, July
-
D. Deeths and G. Brunette, "Using NTP to Control and Synchronize System Clocks," Technical Report 816-1475-10, Sun Microsystems Inc., July 2001.
-
(2001)
-
-
Deeths, D.1
Brunette, G.2
-
13
-
-
42149083231
-
Profiling a Million User DHT
-
Oct
-
J. Falkner, M. Piatek, J.P. John, A. Krishnamurthy, and T. Anderson, "Profiling a Million User DHT," Proc. Internet Measurement Conf. (IMC '07), Oct. 2007.
-
(2007)
Proc. Internet Measurement Conf. (IMC '07)
-
-
Falkner, J.1
Piatek, M.2
John, J.P.3
Krishnamurthy, A.4
Anderson, T.5
-
17
-
-
2442425480
-
The Impact of DHT Routing Geometry on Resilience and Proximity
-
Sept
-
K. Gummadi et al., "The Impact of DHT Routing Geometry on Resilience and Proximity," Proc. ACM SIGCOMM '03, Sept. 2003.
-
(2003)
Proc. ACM SIGCOMM '03
-
-
Gummadi, K.1
-
19
-
-
85001706405
-
Glacier: Highly Durable, Decentralized Storage Despite Massive Correlated Failures
-
May
-
A. Haeberlen, A. Mislove, and P. Druschel, "Glacier: Highly Durable, Decentralized Storage Despite Massive Correlated Failures," Proc. Second Symp. Networked Systems Design and Implementation (NSDI '05), May 2005.
-
(2005)
Proc. Second Symp. Networked Systems Design and Implementation (NSDI '05)
-
-
Haeberlen, A.1
Mislove, A.2
Druschel, P.3
-
23
-
-
34548349212
-
Limiting Sybil Attacks in Structured P2P Networks
-
H. Rowaihy, W. Enck, P. McDaniel, and T.L. Porta, "Limiting Sybil Attacks in Structured P2P Networks," Proc. IEEE INFOCOM, 2007.
-
(2007)
Proc. IEEE INFOCOM
-
-
Rowaihy, H.1
Enck, W.2
McDaniel, P.3
Porta, T.L.4
-
28
-
-
34547492967
-
Eclipse Attacks on Overlay Networks: Threats and Defenses
-
Apr
-
A. Singh, T.-W. Ngan, P. Druschel, and D. Wallach, "Eclipse Attacks on Overlay Networks: Threats and Defenses," Proc. IEEE INFOCOM, Apr. 2006.
-
(2006)
Proc. IEEE INFOCOM
-
-
Singh, A.1
Ngan, T.-W.2
Druschel, P.3
Wallach, D.4
-
30
-
-
0002245383
-
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications
-
I. Stoica, R. Morris, D. Karger, M.F. Kaashoek, and H. Balakrishnan, "Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications," Proc. ACM SIGCOMM, 2001.
-
(2001)
Proc. ACM SIGCOMM
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, M.F.4
Balakrishnan, H.5
-
32
-
-
0039470747
-
Coupon Collecting for Unequal Probabilities
-
H. von Schelling, "Coupon Collecting for Unequal Probabilities," Am. Math. Monthly, vol. 61, pp. 306-311, 1954.
-
(1954)
Am. Math. Monthly
, vol.61
, pp. 306-311
-
-
von Schelling, H.1
-
35
-
-
45749116664
-
A Near-Optimal Social Network Defense against Sybil Attacks
-
May
-
H. Yu, P.B. Gibbons, M. Kaminsky, and F. Xiao, "A Near-Optimal Social Network Defense against Sybil Attacks," Proc. IEEE Symp. Security and Privacy (S&P '08), May 2008.
-
(2008)
Proc. IEEE Symp. Security and Privacy (S&P '08)
-
-
Yu, H.1
Gibbons, P.B.2
Kaminsky, M.3
Xiao, F.4
-
36
-
-
45749109010
-
Sybil-guard: Defending against Sybil Attacks via Social Networks
-
June
-
H. Yu, M. Kaminsky, P.B. Gibbons, and A.D. Flaxman, "Sybil-guard: Defending against Sybil Attacks via Social Networks," IEEE/ACM Trans. Networking, vol. 16, no. 3, pp. 576-589, June 2008.
-
(2008)
IEEE/ACM Trans. Networking
, vol.16
, Issue.3
, pp. 576-589
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.D.4
-
37
-
-
0742267177
-
Tapestry: A Global-Scale Overlay for Rapid Service Deployment
-
Jan
-
B.Y. Zhao, L. Huang, J. Stribling, S.C. Rhea, A.D. Joseph, and J. Kubiatowicz, "Tapestry: A Global-Scale Overlay for Rapid Service Deployment," IEEE J. Selected Areas in Comm., vol. 22, no. 1, Jan. 2004.
-
(2004)
IEEE J. Selected Areas in Comm
, vol.22
, Issue.1
-
-
Zhao, B.Y.1
Huang, L.2
Stribling, J.3
Rhea, S.C.4
Joseph, A.D.5
Kubiatowicz, J.6
-
38
-
-
0003858844
-
Tapestry: An Infrastructure for Fault-Tolerant Wide-Area Location and Routing,
-
Technical Report CSD-01-1141, U.C. Berkeley
-
B.Y. Zhao, J.D. Kubiatowicz, and A.D. Joseph, "Tapestry: An Infrastructure for Fault-Tolerant Wide-Area Location and Routing," Technical Report CSD-01-1141, U.C. Berkeley, 2001.
-
(2001)
-
-
Zhao, B.Y.1
Kubiatowicz, J.D.2
Joseph, A.D.3
-
39
-
-
84873857575
-
Cashmere: Resilient Anonymous Routing
-
May
-
L. Zhuang, F. Zhou, B.Y. Zhao, and A. Rowstron, "Cashmere: Resilient Anonymous Routing," Proc. Second Symp. Networked Systems Design and Implementation (NSDI '05), May 2005.
-
(2005)
Proc. Second Symp. Networked Systems Design and Implementation (NSDI '05)
-
-
Zhuang, L.1
Zhou, F.2
Zhao, B.Y.3
Rowstron, A.4
|